Skip to content
excITingIP.com

Tech Blog & Business Insights

 Menu
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map

Tag: Network Security

An Introduction to Unified Threat Management in Network Security

  • Rajesh K
  • September 8, 2009February 7, 2011

In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is...

An overview of socially engineered deceptive internet threats

  • Rajesh K
  • August 22, 2009February 7, 2011

Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to...

Details about the Denial of Service attack that disabled Twitter access

  • Rajesh K
  • August 17, 2009January 25, 2011

Recently, the micro-blogging platform Twitter was down for more than two hours, thereby denying access to many users across the world for that time. The culprit was found to be...

Host Integrity Check for Endpoint and Network Security

  • Rajesh K
  • July 29, 2009January 25, 2011

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforceĀ  the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of...

Types of DoS attacks and how they are mitigated

  • Rajesh K
  • July 21, 2009January 25, 2011

This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in...

Why is URL Filtering required and how it is accomplished

  • Rajesh K
  • July 13, 2009January 25, 2011

This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various...

Securing and Monitoring portable USB based devices

  • Rajesh K
  • June 30, 2009January 25, 2011

This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphones connecting through USB, CD/DVD media, Digital Cameras...

What is a Phishing threat and how users can be safeguarded

  • Rajesh K
  • June 26, 2009January 25, 2011

This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than...

What are: Packet filtering, Circuit level, Application Level and Stateful Multilayer inspection Firewalls

  • Rajesh K
  • June 13, 2009January 25, 2011

This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls 2. Circuit level gateway Firewalls 3. Application level gateway Firewalls...

An introduction and overview of enterprise network security

  • Rajesh K
  • May 25, 2009January 24, 2011

This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web...

Rajesh K's Intellifluence Influencer Badge

(c) 2009 to Now by excITingIP.com Masonry Blog, WordPress theme by Perfectwpthemes